• Title/Summary/Keyword: Security Planning

Search Result 465, Processing Time 0.024 seconds

A Navigation System for a Patrol Robot in Indoor Environments (실내 환경에서의 경비로봇용 주행시스템)

  • Choi, Byoung-Wook;Lee, Young-Min;Park, Jeong-Ho;Shin, Dong-Kwan
    • The Journal of Korea Robotics Society
    • /
    • v.1 no.2
    • /
    • pp.117-124
    • /
    • 2006
  • In this paper, we develope the navigation system for patrol robots in indoor environment. The proposed system consists of PDA map modelling, a localization algorithm based on a global position sensor and an automatic charging station. For the practical use in security system, the PDA is used to build object map on the given indoor map. And the builded map is downloaded to the mobile robot and used in path planning. The global path planning is performed with a localization sensor and the downloaded map. As a main controller, we use PXA270 based hardware platform in which embedded linux 2.6 is developed. Data handling for various sensors and the localization algorithm are performed in the linux platform. Also, we implemented a local path planning algorithm for object avoidance with ultra sonar sensors. Finally, for the automatic charging, we use an infrared ray system and develop a docking algorithm. The navigation system is experimented with the two-wheeled mobile robot using North-Star localization system.

  • PDF

Analysis on Knowledge and Skills for Information Security Professionals (정보보호 분야 직무별 필요 지식 및 기술 분석)

  • Jun, Hyo-Jung;Yoo, Hye-Won;Kim, Tae-Sung
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.253-267
    • /
    • 2008
  • As the importance of information security becomes a major concern, there has been growing effort to educate information security professionals. This study aims to analyze the level of required knowledge and skills for four information security skills groups: strategy and planning; research and development; system management and operation; and accident control. For this study, we selected 55 critical knowledge and skills for information security professionals by literature review and Delphi method, and we conducted a survey of information security knowledge and skills requirements for information security professionals to perform their jobs. As a result, we analyzed the current status of the information security professionals' knowledge and skills level and suggested some guidelines for establishing the demand-based curriculum for training information security professionals.

A Graphical User Interface Design for Surveillance and Security Robot (감시경계 로봇의 그래픽 사용자 인터페이스 설계)

  • Choi, Duck-Kyu;Lee, Chun-Woo;Lee, Choonjoo
    • The Journal of Korea Robotics Society
    • /
    • v.10 no.1
    • /
    • pp.24-32
    • /
    • 2015
  • This paper introduces a graphical user interface design that is aimed to apply to the surveillance and security robot, which is the pilot program for the army unmanned light combat vehicle. It is essential to consider the activities of robot users under the changing security environment in order to design the efficient graphical user interface between user and robot to accomplish the designated mission. The proposed design approach firstly identifies the user activities to accomplish the mission in the standardized scenarios of military surveillance and security operation and then develops the hierarchy of the interface elements that are required to execute the tasks in the surveillance and security scenarios. The developed graphical user interface includes input control component, navigation component, information display component, and accordion and verified by the potential users from the various skilled levels with the military background. The assessment said that the newly developed user interface includes all the critical elements to execute the mission and is simpler and more intuitive compared to the legacy interface design that was more focused on the technical and functional information and informative to the system developing engineers rather than field users.

A Critical Analysis of the Perspectives on Health Care Reform in Korea (의료개혁 논의의 비교분석)

  • 조병희
    • Korean Journal of Health Education and Promotion
    • /
    • v.15 no.2
    • /
    • pp.217-233
    • /
    • 1998
  • This paper analyzed four different perspectives on health care reform in Korea in terms of the basic values, formulated problems and reform plans, implementation methods, and supporting groups. The medical security plan was insisted by social security specialists and social activists focusing on the integration of medical insurance coops in order to enhancing equity and right of the people. However, its perspective was limited to promoting security instead of reforming health care system. The government proposed the health care reform plans in 1994 and in 1997, focusing on promoting efficiency by remedying many problems in health care delivery system. However, its implementation was not successful due to the lack of organizational and financial supporters. Recently, two opposite proposals were issued. The market reform plan paid attention to revitalizing the market function to promoting efficiency by allowing hospitals to treat private patients instead of applying the medical insurance regulation. The government reform plan focused on intensifying governmental planning and intervention in the health care sector in order to removing inefficiency and promoting equity with the supports of social activists and labor unions. Finally, this paper proposed an alternative plan to promote harmonious social relationship between actors in the health care system.

  • PDF

The Unit Commitment Using the Sensitivity Factor of Security Constrained Optimal Power Flow (SC-OPF의 민감도 계수를 이용한 발전기 기동.정지계획)

  • Kim, Kwang-Mo;Chung, Koo-Hyung;Han, Seok-Man;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.416-417
    • /
    • 2006
  • The recent movement to deregulated and competitive electricity market requires new concepts against existing central dispatch in the system operation and planning. As power systems tend to be operated more closely to their ultimate ratings, the role of SCOPF(Security Constrained Optimal Power Flow) is changed. This paper deals with the proper Unit Commitment condition changed according to the conditions or configuration of power system. This goal of is paper is to obtain proper security and Optimal UC condition through the efficient usage of the sensitivity Factor against critical contingencies. The proposed mechanism has been tested on a sample system and results show more secure conditions against critical contingencies.

  • PDF

Designing Flexible Packets for Multi-Satellite Data Transmission in a Physical Network Separation Environment

  • Baek, Hyun Chul;Lee, Sang Jeong
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.6
    • /
    • pp.26-35
    • /
    • 2020
  • The national satellite operation network, which supports multiple satellites, was designated as a Critical Information Infrastructure (CII) in 2017. The network was designed independently from the control network and the information network to enhance physical security. Planning is underway to establish a bidirectional data interface between networks. The data transmission system allows data flow only to the physical layer and the data link layer; hence, only one file can be transferred at any one time. This means that when large amounts of data are being transmitted, no other data can be sent simultaneously in urgent situations. Thus, this paper discusses the design of flexible packets for the transmission of data between networks in an environment where physical security has been enhanced through network separation and based on this, presents a method for transmitting data effectively.

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

A Study on Continuity Management framework to build (연속성관리 구축 프레임워크 모색에 관한 연구)

  • Ko, Jaechul;Na, Sungjin;Cheung, Chongsoo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2016
  • Until now, there were many BCMS case studies in financial sector based on best practices in BCP(Business Continuity Planning). However, the research on the standardized continuity management system framework that practically applicable to the private and public sectors-based national infrastructure and facilities management are relatively scarce. Therefore, in this study, we research to seek the continuity management system framework suitable for the private or public sector-based facility management through the comparison reviews of domestic and international continuity management system frameworks and the reviews of continuity management components considering the characteristic of the private or public sector-based facility management.

The relations of the pratical level of AIS and level of IMS (회계정보시스템의 활용수준과 정보화경영체제의 수준과의 관계)

  • Kim, Kyung-Ihl
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.253-261
    • /
    • 2007
  • Researcher studied the factor of successful implementation for AIS. I found the facts that the elements of IMB affected the Practical level of AIS and the affected factors are operating of IMS, security and emergency action. Specially I suggest that the importance of operating procedure planning, maintenance of operating, and continuous improvement, security and emergency planning, doing and check. Most of important factors of improving the level of AIS, are the implementation of IMS. the results of this research support this suggestion.

  • PDF

Application of Reinforcement Learning in Detecting Fraudulent Insurance Claims

  • Choi, Jung-Moon;Kim, Ji-Hyeok;Kim, Sung-Jun
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.125-131
    • /
    • 2021
  • Detecting fraudulent insurance claims is difficult due to small and unbalanced data. Some research has been carried out to better cope with various types of fraudulent claims. Nowadays, technology for detecting fraudulent insurance claims has been increasingly utilized in insurance and technology fields, thanks to the use of artificial intelligence (AI) methods in addition to traditional statistical detection and rule-based methods. This study obtained meaningful results for a fraudulent insurance claim detection model based on machine learning (ML) and deep learning (DL) technologies, using fraudulent insurance claim data from previous research. In our search for a method to enhance the detection of fraudulent insurance claims, we investigated the reinforcement learning (RL) method. We examined how we could apply the RL method to the detection of fraudulent insurance claims. There are limited previous cases of applying the RL method. Thus, we first had to define the RL essential elements based on previous research on detecting anomalies. We applied the deep Q-network (DQN) and double deep Q-network (DDQN) in the learning fraudulent insurance claim detection model. By doing so, we confirmed that our model demonstrated better performance than previous machine learning models.